Vulnerability Management: A Case Study by the State of New York

In this webcast, we discuss how to automate the process of searching for, finding, fixing and reporting on the worst cyber security problems first. To provide a real-world example, the CISO for the State of New York Deborah Snyder will describe how the state is tackling vulnerability management to significantly drive down risk.

Today, securing web applications has become more complex as organizations increasingly deploy and manage their web applications in the cloud. Modern web technologies such as sophisticated JavaScript frameworks and SPAs present increasing challenges to web application scanning, as crawling has become more difficult to manage.

During this webcast Alex Jones from Gainsight and Dave Ferguson from Qualys will discuss how Qualys has helped Gainsight to:

Companies across a wide gamut of industries and regions all strive to effectively manage risk and compliance, but too few actually achieve it. As IT, business, and regulatory environments grow increasingly complex, risk and compliance pros must move past outdated processes and legacy systems to innovate and find ways to achieve higher degrees of efficiency and oversight.

During this webcast, guest speakers Nick Hayes, Analyst at Forrester, and Josh Hankins, Information Security Solutions Manager at 84.51° will cover how you can:

· Move up the maturity curve through better program coordination and technology integration.
· Establish the right metrics to build the business case and showcase continual progress.
· Bolster future success by prioritizing business agility and data mastery as top strategic objectives.

Third-parties, partners and vendors with access to your networks and data make your organization vulnerable to breaches. Clearly, your business needs to work with third parties, but you don’t want your company to fall victim to data theft, brand damage, and possible government fines as a result, so you have to take third-party and vendor assessment very seriously.

With Qualys Security Assessment Questionnaire (SAQ) you can expand the scope of risk and compliance data beyond technical vulnerabilities to verify that third-party vendors are in compliance with emerging regulatory requirements. By automating a traditionally manual process, Qualys SAQ frees you from unreliable and labor-intensive approaches such as email and spreadsheets.

The need to prioritize vulnerability management (VM) is greater than ever as IT security teams become overwhelmed with trying to protect against every threat that pops up. Organizations that understand the varying risks across vulnerabilities can focus on resolving dangerous exploitation, and avoid wasting crucial time addressing insignificant ones.

We invite you to attend the “Improving on 'Whack-a-Mole' Vulnerability Management” webcast featuring guest speaker Joseph Blankenship, Senior Analyst at Forrester, and Jimmy Graham, Director of Product Management at Qualys.

The following topics will be discussed during the webcast:

* Forrester data trends and insights from real-world client scenarios

* Why vulnerability management needs to be prioritized and elevated

* How Qualys ThreatPROTECT shows you what to remediate first (led by Qualys)

Dealing with a large number of IT vulnerabilities is an issue for most organizations. Only 10 Common Vulnerabilities and Exposures (CVEs) account for 97% of the exploits*. Clearly, it is vital for you to identify which of your vulnerabilities are the most critical to address first with fast, effective remediation.

Qualys’ newest solution ThreatPROTECT correlates vulnerability data with a Live Threat Intelligence Feed from multiple industry sources, providing customers with an easy-to-understand dashboard that provides clear insight into which vulnerabilities to fix first.

During this webcast presenters Wolfgang Kandek, and Tim White, will show you how you can use ThreatPROTECT to:

* Quickly identify your most important assets and critical vulnerabilities

* Prioritize remediation efforts so you know which vulnerabilities to tackle first

* Eliminate the guesswork with real-time correlation of active threats

As a security professional, getting to know your current vulnerability data from your mobile workforce is a difficult task. If the mobile devices are not on the network at the time of your scan, or if you do not schedule a scan for the devices specifically, your data could become out of date by weeks or even months.

During this webcast, Corey Reed from Synovus Bank and Wolfgang Kandek from Qualys will discuss how Qualys Cloud Agent has helped Synovus Bank to:

The foundation of security is control. But how do you control what you can't search?

A huge hurdle to protecting your network is knowing exactly what devices are connected. It’s increasingly difficult for organizations to know what IT assets exist in their environment, where they’re located, who manages them and their associated security risks.

* Run instant queries that return results in seconds
* Search for OS and App configuration information on all your assets for fast, accurate and actionable data
* Get a unified view of your IT and Security data

Knowing what IT assets you have and how to protect them is increasingly a challenge as globalization, virtualization and mobile assets create new endpoints and new opportunities for hackers to infiltrate. Now you can move beyond traditional scanner-based approaches to strengthen endpoint security with a free solution from Qualys.

Discover how the Qualys AssetView gives you a fast, actionable view of all IT assets while helping to:

> Deliver fast, accurate and actionable data — with a new layer of intelligence into the current state of endpoints, including details about services, file systems and registries as well as information to manage and secure systems

> Minimize impact on systems and networks — by keeping itself lightweight and up-to-date to eliminate the need to reboot

> Handle virtualized environments with ease — by keeping track of the constant proliferation of images inside and outside of the environment

To effectively prioritize and remediate the most critical vulnerabilities threatening your organization, you need to combine internal asset risk evaluation with external real-time exploit and threat intelligence to create the most accurate picture of incidence and impact.

Join this webcast to learn how Qualys and Brinqa provide all the tools you need to dramatically improve the effectiveness and performance of your vulnerability management program, including :

Powerful technologies from the core to the edge are enabling new insights and transforming value creation. But these opportunities create new risks and urgently beg for innovative approaches to securing our most precious information. Learn how a new architecture of cloud security expertise, endpoints and apps will enable high-confidence computing and deliver security and privacy anywhere, anytime.

To effectively prioritize and remediate the most critical vulnerabilities threatening your organization, you need to combine internal asset risk evaluation with external real-time exploit and threat intelligence to create the most accurate picture of incidence and impact.

Join this webcast to learn how Qualys and Brinqa provide all the tools you need to dramatically improve the effectiveness and performance of your vulnerability management program, including :

With cyber security taking the front seat in the boardroom, CISOs now have more visibility than ever before. But, many are struggling to gain the visibility they need to be effective and searching for practical techniques to gain full control over their assets for continuous security and compliance.

Join this webcast where we'll cover the ABCs of being a pragmatic CISO.

To prevent attack requires a multi-layered solution that addresses one of the most vulnerable parts of your IT environment. Join us for this webcast to learn how Qualys Web Application Scanning (WAS) and Qualys Web Application Firewall (WAF) work together to provide your organization true, integrated protection.

In this 30-minute webcast, industry experts Mike Rothman, President of Securosis Research and Wolfgang Kandek, CTO of Qualys will share their top recommendations for making the most of National Cyber Security Awareness Month. With data breaches in the headlines of nearly every online magazine, it’s never been a better time to maximize cyber security awareness and translate it into pragmatic results for the enterprise.

During this webcast, attendees will learn
:
* Which tactics have the greatest effect on fostering cyber security awareness throughout the enterprise

* How to foster a risk-aware security culture while still encouraging trust among your employees and partners

* How to bridge the gap between IT security and IT operations (hint: knowing more about your assets is the first step)

Now you can get continuous, automated detection and protection against any vulnerability, anytime, with the next generation of Qualys Vulnerability Management (VM). Join us for this webcast to watch a live demonstration of the comprehensive VM solution from Qualys.

This live webinar will showcase how Qualys and Kenna together connect an organisation’s vulnerability scanning program with actionable threat intelligence to employ a risk-based approach to vulnerability management. Attendees will learn strategies for applying actionable threat intelligence to their vulnerability management programs.

This live webinar will showcase how Qualys and Kenna together connect an organization’s vulnerability scanning program with actionable threat intelligence to employ a risk-based approach to vulnerability management. Learn how companies are driving down their exposure to vulnerabilities that match active Internet breaches, and track remediation progress with little manual effort and without adding additional headcount.

In this webcast, we will look into some easy steps you could take to run vulnerability scans against web applications. We will show you step-by-step how to configure Qualys Web Application Scanning, execute discovery and vulnerability scans, as well as run reports and create a strategy for remediation.

Join us for this informative technology series for insights into emerging security trends that every IT professional should know. These brief sessions will give you an opportunity to discover best practices from market leaders as well as hands-on advice from industry experts on a variety of security and compliance topics.

Let Qualys help keep you up-to-date with cost-effective and efficient technology trends. Choose the topic that interests you or plan to attend the entire series to make sure you stay ahead of the curve.